Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 12:13
Static task
static1
Behavioral task
behavioral1
Sample
a57a8bce281fd0368d78dca32fae4c1b_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a57a8bce281fd0368d78dca32fae4c1b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a57a8bce281fd0368d78dca32fae4c1b_JaffaCakes118.html
-
Size
16KB
-
MD5
a57a8bce281fd0368d78dca32fae4c1b
-
SHA1
88eb59fd06077e4648a928838ab2ca9bff038721
-
SHA256
e0019e4bdd22f620056726088541fe4bae1ce024a1161f36cf86ebc8dce22e18
-
SHA512
94a83128e5e1534e15e647943a7203a0544d57b41fe8b7d0525b617763d68c35facc0c90e83d0e1e971c225f61d565d68ebc319e2fd8813dd31406632a1ccce2
-
SSDEEP
192:ukWPlT5uNJHafk1CR1Ub0ohBtySB++k32KBEKrlshLaWu4Bb/FaoV:unQ30RuQo4022KHrqaYJ/FaoV
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{579494A1-297E-11EF-820E-FE0070C7CB2B} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb8100000000020000000000106600000001000020000000d77ea8a70ae939db40b1b5fec4569bfaec1b24ca7bcfd825110fd0904ace08bb000000000e8000000002000020000000c6d339cb83d47f10a27135080f3ecc2ce3baaf7127783053ba02d2c0e1c6ece4200000006cf282f498ccf44bfb71e668e09da3094cffd0562bf6fe5b7ecf1806ff9b7a93400000008181db92d2fffdc397254930eb7233084e97d5f70dc0aabba404fe3f7f5057b18270bfd921671b8160d37d90b7aeb5b1d48b8433a0c6479bd9fef5af6a6231e4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424442676" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 707e422c8bbdda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2456 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2456 iexplore.exe 2456 iexplore.exe 1700 IEXPLORE.EXE 1700 IEXPLORE.EXE 1700 IEXPLORE.EXE 1700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2456 wrote to memory of 1700 2456 iexplore.exe 28 PID 2456 wrote to memory of 1700 2456 iexplore.exe 28 PID 2456 wrote to memory of 1700 2456 iexplore.exe 28 PID 2456 wrote to memory of 1700 2456 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a57a8bce281fd0368d78dca32fae4c1b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2456 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5823a347f72991aadf1feb96a1802e82b
SHA146784a4d033c88ac5717e445bff0db23b5b18204
SHA2565d6ea66723e88ef4c1f07b4e6644040cb1fe9f8a51b98d8df5d7e89d5a12c103
SHA512861ada4cf348254128949b4d31f62cb446650a7ac2546a9064f1a06e916a0c845a30bf28be051d1782963b87c145eb1efd18cb0f730081aa19a6c5b39521a108
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc8faee226a77fb86f749ba13e3247cb
SHA1d5d6b948024d938b140ed5e84fdc522d296ecd64
SHA2566f89e90f09d48b59a0e2f0abda61adb7bfb74ad6793d48c0f598d8d0fcbec522
SHA512b0303eacade5d31618bdfa48ef48dcb0e6d3d86dd21f35e5935c6e576c22a3886d3d83b2f6fc2c4933396fb9fa095cd74dbab8d590520ed31dc94b2e83ede8f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7187442f300159e08be80813b51bffd
SHA1cdb9e2978a36e03a9d0e47cd860e49bd1f8395cc
SHA25674f9ebbdb9db0fe76b22bef4f81ff71d7dc794c3accf1153a6bb4c52bcf02ba5
SHA5124ad37c950ccc4d7b5095d323f797e45ea556a09800ad22c7ee479eb07ca12108e1d0571ab1dfc0493381867f06ab8470b50623843a9a0895607a88a2d2a0288e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5030c76b0370a7a678fbc912182d17a67
SHA10d97a46585e3950e8f7511f8455621317ff4f416
SHA2562da7d3e0d2ee19c0de6326c24bab4a380a19c16f6fd9d021c267ef63a17d147d
SHA5121b8641d194ff57af51efc45f279efa3dbf2488df5e7e03335804d758192d65b4d7ce636503c9f2f5b8a0d8d9bd70540a8222a97567645f2de047f3576d245998
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581c4d5898933b06ce2643d1a5f0f3fb4
SHA103e913d98d4a6218190e4aeab4071f3a7f298ced
SHA2565f4eeba0371d3f429f9b57335781f9923ffbae2bd0577770563fa81b6575b145
SHA51200e56cb89f6537e69c832eb10df08f0d310d2727cd227fe1946ea564c40c4897cac0acc290bfc390aab4fc93ffc0e40e73e12f914bbe571a1d55dc07cd8ccb16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da0ff91f1361218f8f4b0127b5d1757e
SHA1f2e9490e3f467d6d2b8e5b6cbc7aaca80d0951ba
SHA2568628ab10c0116eedb7957617dbe50035ab32f900b09298828c6ad0633c537402
SHA5120f55f973cbea0b4802914fc71cb3add284e52a642314465a6c4fa4436ed97ae17948b1f4a8e8aef1f65c67cdbe37a7ff0212b978cb270684c1ed50c07867e4ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4681047baf343857aff1e38a71814fb
SHA110e50bbb95eb44469c94208638fc4d65e6b78eb9
SHA256912d8cdcf4ef38ea2b585fa066b1ca0cbc403f3ea9bcd3dc6b01cc61057265d8
SHA512a6e439c4f0d5d0d8830edbac7a8068c1e3d63c2fe33fb62d468ae883a1381d1e9daf81f1252d9c4ed5474089a079d3a9976eadebedae5f2ada4f5a718b55765e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff9b3970ca647013b609813aef3d2962
SHA17cccd52c5b406028af94432beb4a560dcac0fb65
SHA256ac94788a926e86ded53bcaa33d528a2a3838e40b8f5d87614233bc64c94cd87b
SHA51217253f8a72738fecf41dcd772a730f5bfca764aa497dc234d3500ac8fecf22f170b4f4bb3302ea7674ac22b7cbc53272f86b5443684166a0b3a75453bfb84b58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501f69bf7a94ad906c6e3f3166f007547
SHA151d33591f37587657904e9b0bf65159344386015
SHA256f8e34879ecabab009956867b66d7291cd7872aca1f78537e659555ae17f6a738
SHA5129d558d1dfa2a6e8fcb7241d7a8e30810bb0f9921ce678e01f8a81e0b451f0a26460c160f1d8590a4a5ae53ff01a02b5ec8a4eaba02c1f264688062ff4271fe48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c1af014bdd345ec0580d4e67e51d072
SHA19df6dc8807fd88e496e861f687cffbe0670872d9
SHA256b60a14d58bb536e57b221663aa503e695f5fb581affde25aa580aa891fa6d942
SHA51278806cb40ca15be0d5b8404db7aef5bf682603aa0a88e44cc4e59b356cf4f636d67613650ba59d77f45ea07a3da6dbc60e428c96d8d109b5d06758e8a7307f9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a713c876518d6dac298038a817f1544d
SHA14ebf89dd507068f482963d37f25bd408fb7dca8c
SHA256b8e040fc8d0ced677201df852c760a2884b9dfb6193fc81a64c2fac26c4c28d7
SHA5128a16990885ab424bef53b56c93b1bbbcb9050cb100debbdb85d4be83eb8e7b7101f61ca1dd46cb2e301a423a037e3f6e65cca3a9393508176879d7b488827659
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59acdccb382d3cdc30a60cdf741d2f3d1
SHA18e3cec28a854fd010d05b10635753aa775a3155b
SHA2566ab32e4de32e9ff7c662057afae933913526012a34c881f9d3e84e7fefd8ae51
SHA5126e816a5ba719d1bad10eeb301f9f6255ee49472c50f3c351041bbecd808aaf441a863fc367ed5894adc41b93d665fc12d86a0e2ab71fad513368dd5b2d463f3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe89c9fdc39ee027d8013f233333da22
SHA172afbc3399a967841c762095b78439c3a64265b7
SHA256c06276cc52bb6af7f78ba5c2eca08b1b56946c098a42001d16d13317665b686b
SHA51235c32ce2f42a762120683d195e71fea3ed5bb12e2afe9fec2a6d0ab370408c5d23bbe1c36fd8e00a830e1b09c9d29e13e9d6e860ba10c7f00150c1d5fc46fe8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524a73e43eb3bf9103eef83e04b04de17
SHA1e49cf329b5a925b9e8b823878572b75164fa5512
SHA2566939d9d56201e8809a650a53b43422bc955c0e3d6fc9ed5436042ff98066cde0
SHA5122fdcf480969a6c3ee1335bbc8309701f2d853dbf4dc087c58113a12dc6f14487d8eacdce33b82f99380ce393b98b1fdf28dc73eb604f678e866f8c5cb5fa48d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5111dea726756a6a2a064345819a26a02
SHA139cfabdb70f018a293bf7270dabe2aac7ba33ba1
SHA256ab4a7b1149ac00d23d6dc2da76e93ac5e6f00c1861505b3fd7a325bf6d9927f6
SHA5125d233150d29bf9e776c5f2736aa28189ffb8fc22cd040287bbb683eb3217477b0547ed28136833624b0eda3c50f00b06593fa63f9d040acfa82d99b61d083218
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb2fbddb3ab3ceef764e436e51da75d2
SHA1f3a30d1578a6bf913a1a468a7a0d1e219cebd538
SHA25614d3ac88ff277445eb655b013ce07d6a34abef248c8a323395f626cc0111fe28
SHA5120f1f3cc92c185c0726fa5f425d513344ef0d7648a421f2ca332a10a9350c13527ffad662a097d8e297513fc9e0c6ab16c3e8a9a0bc2f12c87beb155aa03a5410
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543f2ab4c3818c14b7db6177671c1bc3b
SHA1febc34ddfd354218771454cea7e4ddc7c67b8bc7
SHA2569fdc1f6341eb321741b2ba675c41b6a4a4c7b9c2a3796b9dafc370e5ff765d48
SHA51209fd625778659c86de48afbd386b23cf2317dd3416d97855e6ec7fa1fae304207c3f71fc36361c6ce2578e70308803b87d5bd04b91b4b91db5761399d276bae9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50104b8a6d2e94b74a5c2503ea93d7eed
SHA1ebd3da374b1b314f9d38e8b66169fe59ee761e9d
SHA256a7b25cbf2823e8b4f5c60a3cb3e24dcf36fbacf9b5c565d352928fa35b24036a
SHA5122cb045c0c55d3fc9a1fefcfce28d7ffbf49cd2b3af5cfa6150536f4bcd8c107906ac1b470d05734a5b81ff092a154e69ce496d7aec0b419feda1ab5ca8392220
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c9f323f30e21ee375389922b9ae865c
SHA1d4ed467cd3986b4f97df66c49921076e07fce79f
SHA256915ef3818b69240addfcf890ebbbe1759a0817f4ff8c37114b25dcfdc4173cb8
SHA512c116170f5c3f001b4a0ac661240e6658f2814c30f34deb70a669b53dd5fe0fc5c0f2b76cbac9a41cddac85b46829d3cf28777ae57a339b0d8488045ff4117a2c
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b